Cyberpunkrs / pixies
articles of hacking, programming, privacy, activism
☆22Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for pixies
- ☆30Updated 4 years ago
- Kurgan AI - Web Application Security Analyzer☆26Updated 7 years ago
- Ferramenta de Reconhecimento para Pentest☆45Updated 3 years ago
- Pequenos tutoriais e exemplos de código☆9Updated 3 years ago
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Updated 6 years ago
- API em Shell Script para desenvolvimento de Bots na plataforma Telegram.☆100Updated 3 years ago
- H2HC 2016 Slides/Materials/Presentations☆29Updated 7 years ago
- Lock user screen every time the flash drive is unplugged. Creating a two-step authentication on the machine☆16Updated 6 years ago
- A set of functions to increase productivity while hacking with Bash☆197Updated 5 months ago
- cuz life is scriptable...☆25Updated 8 years ago
- Pentest tool for OSINT in social networks☆36Updated 9 years ago
- Um compilado de links para introduzir os chegados nas artes negras da engenharia reversa.☆24Updated 4 years ago
- Peça lanches facilmente para lanchonetes pelo WhatsApp com essa ferramenta☆40Updated 3 years ago
- Amarula Python Botnet☆9Updated 5 years ago
- Simple Keylogger with smtp to send emails on your account using python works on linux and Windows☆35Updated 4 years ago
- A program that helps you keep up with new Anime releases.☆22Updated last year
- Verifique em tempo real a velocidade da sua internet e crie arquivos de logs.☆31Updated 7 years ago
- My old lectures material about C and ASM☆6Updated 7 years ago
- A command line Swiss army knife for string and number conversions☆17Updated 4 years ago
- Wordlists based on Brazilian passwords and dictionaries.☆162Updated 8 years ago
- Ferramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de re…☆99Updated 6 years ago
- SPLITTER is TOR based load balance approach create to difficult correlation, traffic analysis and statistical attacks inside TOR network.☆121Updated last year